Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


MEDIDNA.001C1 


IN THE UNITED STATES PATENT AND TRADEMARK OFFICE 


Applicant 
Appl. No. 
Filed 
For 


Examiner 


Benson et al. 
Herewith 

METHOD AND SYSTEM FOR 
MANAGING A DATA 
OBJECT SO AS TO COMPLY 
WITH PREDETERMINED 
CONDITIONS FOR USAGE 

Unassigned 


Group Art Unit Unassigned 


PRELIMINARY AMENDMENT 

Assistant Commissioner for Patents 
Washington, D.C. 20231 

Dear Sir: 

Prior to an examination on the merits, please enter the amendments below. 


IN THE CLAIMS; 

Please cancel Claims l-2Vwithout disclaimer or prejudice. 

Please add the following new Claims 30-69 as follows: 


j 36. A method of managing a data object so as to comply with control conditions for 
usage of the data object, comprising: 

providing a variable number of control conditions for usage of the data object; 
providing a general set of control data for the data object based on the variable 
number of control conditions for usage, the general set of control data comprising at least 
one or more usage control elements defining usages of the data object which comply with 
the variable number of control conditions; 

combining the general set of control data with the data object; and 


-1- 


Appl. No. Unasip^d 

Filed : Herewiin 


encrypting the data object and the one or more usage control elements to create a 
secure data package. 

yc. The method of Claim ><5, additionally comprising encrypting together the data 
object and the general set of control data. 

1 

3 ^ The method of Claim wherein providing the general set of control data 
includes providing an identifier which uniquely identifies the general set of control data. 

^3^. The method of Claim wherein providing the general set of control data 
includes providing a security control element which identifies a security process to be applied 
before usage of the data object is allowed. 

^ 3^. The method of Claim 30, wherein providing the general set of control data 
includes providing a format control element which identifies the format of the control data. 

1^, The method of Claim additionally comprising: 

receiving a request for authorization for usage by a user; 

comparing the usage for which authorization is requested with the one or more 
usage control elements of the general set of control data; and 

granting the authorization if the usage for which authorization is requested 
complies with the usages defined by the one or more usage control elements. 

Z6, The method of Claim 3^ additionally comprising requiring payment for the 
requested authorization for usage before granting the authorization. 

^ 3v. The method of Claim additionally comprising: 

transmitting the secure data package into a data processor; 


AppLNo. Unas.'^^d 
Filed : Herewith 

checking, in response to a request by a user for usage of the data object, whether 
the requested usage complies with the usage defined by the at least one usage control 
element of the general set of control data; and 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the general set of control data, the data object 
so as to enable the requested usage. 

* >8. The method of Claim 37, additionally comprising: 

combining, after the usage of the data object, the data object and the one or more 
usage control elements; and 

reencrypting at least the data object and the one or more usage control elements. 

A method of controlling the usage by a user of a data object so as to comply with 
control conditions for usage of the data object, comprising: 

providing a variable number of control conditions for usage of the data object; 

providing a data package comprising a data object and control data, which 
comprises at least one usage control element defining a usage of the data object which 
complies with the variable number of control conditions, the data object and the at least 
one usage control element being encrypted; 

receiving a request by the user for usage of the data object; 

decrypting the control data; 

checking, in response to the request by the user for usage of the data object, 
whether the requested usage complies with the usage defined by the at least one usage 
control element of the control data; and 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the control data, the data object and enabling 
the requested usage. 

The method of Claim 3^, wherein the usage control element is updated after the at 
least one usage of the data object. 


AppL No. Unas.^^d 

Filed : Herewith 


4^ The method of Claim wherein the control data comprises an indication of the 
number of times the user is authorized to use the data object in accordance with the at least one 
usage control element, wherein the requested usage of the data object is only enabled when the 
number of times is one or more, and wherein the number of times is decremented by one when 
the requested usage is enabled. 

JO 

i^^. The method of Claim wherein the control data comprise a security control 
element, and additionally comprising executing, before each usage of the data object, a security 
procedure defined in the security control element. 

The method of Claim wherein checking whether the requested usage complies 
with the usage defined by the at least one usage control element, comprises checking that a data 
processor is capable of executing a security procedure specified in a security control element of 
the at least one usage control element, and if not, disabling the usage. 

The method of Claim 3^, additionally comprising: 

combining, after the usage of the data object, the data object and the one or more 
usage control elements; and 

reencrypting at least the data object and the one or more usage control elements. 

j5. A system for managing a data object so as to comply with control conditions for 
usage of the data object, comprising: 

a user interface module which receives a variable number of control conditions; 

a packaging module which provides a general set of control data for the data 
object based on the variable number of control conditions for usage, the general set of 
control data comprising at least one or more usage control elements defining usages of 
the data object which comply with the variable number of control conditions and which 
combines the general set of control data with the data object; and 


Appl. No. Unasi^^d 

Filed : Herewith 

an encrypting module which encrypts the data object and at least the one or more 
usage control elements to create a secure data package necessary. 

^. The system of Claim 4^ wherein the general set of control data comprises a 
control data element which controls further distribution of the data object. 

The system of Claim 45; wherein one of the usage control elements includes a 
security control element that defines a security procedure. 

jX. The system for controlling the usage by a user of a data object so as to comply 
^ with control conditions for usage of the data object, comprising: 

a usage manager module which receives a variable number of control conditions, 
checks whether a usage requested by the user complies with the usage defined by at leasi 
one usage control element that c6mplies with the variable number of control conditions, 
and disables the usage requested by the user when the usage does not comply with the 
usage defined by the at least one usage control element; and 

a decryption module which decrypts the at least one usage control element and the 
data object. 

0. The system of Claim 4«: wherein one of the usage control elements includes a 
security control element that defines a security procedure. 

^. The system of Claim 4^, wherein the security procedure is an RSA 
algorithm. 


encryption 


7> l<^| 
>1 . The system of Claim A%, wherein the usage manager module repackages the data 
object after usage. 

^. A method of controlling the usage by a user of data objects so as to comply with a 
variable number of conditions for usage of the data objects, comprising: 


-5- 


AppI.No. Unas^!;d 
Filed : Herewith 

providing at least two data packages, each data package comprising a data object 
and a user set of control data, which comprises at least one usage control element 
defining a usage of the data object which complies with the variable number of 
conditions, the data object and the at least one usage control elements being encrypted; 

decrypting the usage control elements of the user sets of control data; 

examining the usage control elements of the at least two data packages to find a 
match; and 

performing an action being specified in the user sets of control data of the at least 
two data packages. 

yS. The method of Claim ^ wherein one of the at least two data packages is a sell 
order, and wherein one of the at least two data packages is a buy order. 

54. The method of Claim 3^, additionally comprising checking whether a data 
processor is capable of executing a security procedure specified in a security control element of 
the at least one usage control element, and disabling the usage when the data processor is not 
capable of executing the security procedure. 

The method of Claim 52, additionally comprising: 
updating the at least one usage control element of each data package; 
combining after the usage of the data objects, each of the data objects and its at 
least one usage control element; 

reencrypting each of the combined data objects and its at least one usage control 
element; and 

transferring the repackaged data objects to their providers. 


A method of managing a data object so as to comply with a variable number of 
ontrol conditions for usage of the data object, comprising: 

providing variable control conditions for usage of the data object; 


Appl. No. Unasl^id 

Filed : Herewith 

providing a general set of control data for the data object based on the variable 
control conditions for usage, the general set of control data comprising at least one or 
more usage control elements defining usages of the data object which comply with the 
variable control conditions; 

providing, in response to a request for authorization for usage of the data object 
by a user, a user set of control data, which comprises at least a subset of the general set of 
control data, including at least one of the usage control elements; 
combining the user set of control data with the data object; 
encrypting at least the data object and the at least one of the usage control 
elements of the user set of control data to create a secure data package; and 

checking, before allowing transfer of the data package to the user, that the request 
for authorization for usage of the data object has been granted. 

ills ga- 

yi. The method of Claim ^, additionally comprising checking whether a data 
processor is capable of executing a security procedure specified in a security control element of 
the at least one usage control element, and disabling the usage when the data processor is not 
capable of executing the security procedure. 

^. The method of Claim S^, wherein the data object is composed of at least two 
constituent data objects and wherein the user set of control data, in response to a request for 
authorization for usage of one of the constituent data objects by a user, is created only for that 
constituent data object and combined only with a copy of that constituent data object. 

^ 5^. The method of Claim ^, wherein the request for authorization is received from a 
user via a data network. 

^. The method of Claim $6, wherein the data object is a composite data object 
including at least two constituent data objects, and wherein providing a general set of control 
data comprises providing a respective general set of control data for each of the constituent data 
objects and the composite data object, and wherein providing a user set of control data comprises 


-7- 


Appl. No. UnasM^d 

Filed : Herewith 


providing a respective .er se. of control data for each of .he constituent data objects and fl,e 

composite data object. 


^/r. TTte method as defined in aaim*5< additionally comprising storing the nser set of 
control data in a processor of a data object provider. 

The method as defined in Claim additionally comprising: 
transmitting the data package; 

decrypting the at least one usage control element of the user set of control data- 
checking, in response to a request by the user for usage of the data object, wheiher 

the requested usage complies with the usage defined by the at least one usage control 

element of the user set of conttol data; and 

decwting, in response to the requested usage complying „ifl, the usage defined 

by the at least one usage control element of the user set of cont«,l data, the data object 

and enabhng the requested usage. 

^. The method of Claim 5^. additionally comprising: 
transmitting the data package; 

deco'pting the at least one usage control element of the user set of control data; 

checking, in response to a request by the user for usage of the data object, whedier 
the requested usage complies with the usage defined by the at least one usage control 
element of the user set of control data; 

decrypting, in response to the requested usage complying with the usage defined 
by the at least one usage control element of the user set of control data, the data object 
and enabling the requested usage; and 

combining, after the usage of the data object, the data object and the one or more 
usage control elements of the user set of control data, and combining at least the data 
object and the one or more usage of the user set of control data. 


■p. 


V. A system for managing a data object so as to comply with control conditions for 
usage of the data object, comprising: 


-8- 


Appl. No. : Unasi 

Filed : Herewr 

a packaging module which provides a general set of control data for the data 
object based on variable conditions for usage, the general set of control data comprising 
at least one or more usage control elements defining usages of the data object which 
comply with the variable conditions and which combines the user set of control data with 
the data object, and wherein the packaging module provides in response to a request for 
authorization for usage of the data object by a user, a user set of control data, which 
comprises at least a subset of the general set of control data, which subset comprises at 
least one of the usage control elements; 

an encrypting module which encrypts the data object and at least the one or more 
usage control elements of the user set of control data to create a secure data package, 
which is ready for transfer to a user; and 

a control module which checks that the request for authorization for usage of the 
data object has been granted before allowing transfer of the data package to the user. 

^ A method of managing a data object so as to comply vnth control conditions for 
usage of the data object, comprising: 

providing a general set of control data for the data object based on a variable 
number of control conditions for usage, the general set of control data comprising at least 
one or more usage control elements defining usages of the data object which comply with 
the variable number of control conditions; and 

encrypting the data object and the one or more usage control elements to create at 
least one secure data package. 

^. The method of Claim 0, wherein the data object and the usage control elements 
are each encrypted into separate secure packages. 

' 0. The method of Claim ^, wherein providing the general set of control data 
includes providing a security control element which identifies a security process to be applied 
before usage of the data object is allowed. 


AppL No. 
Filed 


Herewitli 



^ /8. The method of Claim wherein providing the general set of control data 
includes providing a format control element which identifies the format of the control data. 

jVj . The method ofClaim^, additionally comprising: 

p ^ receiving a request for authorization for usage by a user; 

C comparing the usage for which authorization is requested with the one or more 

usage control elements of the general set of control data; and 

granting the authorization if the usage for which authorization is requested 

complies with the usages defined by the one or more usage control element. 

Respectfully 


*ed^. 


KNOB^C MARTENS, OLSON & BEAR, LLP 


Dated: I O / 9^ 


S:\DOCS\EMN\EMN-1 526.DOC/kz9 
060198 


By: 


John M.ljCarson 

Registration No. 34,303 

Attorney of Record 

620 Newport Center Drive 

Sixteenth Floor 

Newport Beach, CA 92660 

(619) 235-8550 


-10-